Sie sind auf Seite 1von 11

List of Books Written by Ankit Fadia

Title: An Unofficial Guide to Ethical Hacking Price: Rs. 385 Publisher: Macmillan India Ltd. Title: Network Security: A Hacker's Perspective Price: Rs. 295 Publisher: Macmillan India Ltd. Title: Ethical Hacking Guide to Corporate Security Price: Rs. 265 Publisher: Macmillan India Ltd. Title: Hacking Mobile Phones Price: Rs. 220 Publisher: Macmillan India Ltd. Title: Email Hacking Price: Rs. 175 Publisher: Vikas Publishing House Pvt. Ltd. Title: Windows Hacking Price: Rs. 165 Publisher: Vikas Publishing House Pvt. Ltd. Title: Google Hacking Price: Rs. 225 Publisher: Vikas Publishing House Pvt. Ltd. Title: Network Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection Price: Rs. 275 Publisher: Vikas Publishing House Pvt. Ltd Title: Encryption: Protecting Your Data Price: Rs. 245 Publisher: Vikas Publishing House Pvt Ltd. Title: Software Hacking Price: Rs. 350 Publisher: Vikas Publishing House Pvt. Ltd.

ccess Denied: The Complete Guide to Protecting Your Business on the Internet, by Cathy Cronkhite; Jack McCullough, ISBN: 0072133686, Aug 2001. [$] Advent of Netwar, by John Arquilla; David Ronfeldt, ISBN: 0833024140, Jan 1996. [$] Anarchy Online: Net Crime and Net Sex, the Truth Behind the Hype, by Charles Platt, ISBN: 0061009903, Mar 1997. [$] At Large: A True-Crime Tale of the Internet Age, by Charles C. Mann; David H. Freedman, ISBN: 0684824647, Aug 1997. [$] The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, by Clifford Stoll, ISBN: 0743411463, Oct 2000. [$] The Complete Hacker's Handbook: Everything You Need to Know about Hacking in the Age of the Web, by Dr K, ISBN: 1858684064, Sept 2000. [$] Computer Crime: A Crime-Fighters Handbook, by David Icove; William Vonstorch; Karl Seger, ISBN: 1565920864, Aug 1995. [$] Computer Crime: Phreaks, Spies, and Salami Slicers, by Karen Judson, ISBN: 0766012433, Jan 1999. [$] Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities, by Peter N. Grabosky; Russell G. Smith, ISBN: 0765804581, June 1998[$] Cyber Crime: How to Protect Yourself from Computer Criminals, by Laura E. Quarantiello, ISBN: 0936653744, Dec 1996. [$] Cybercrime: Security and Surveillance in the Information Age, by Douglas Thomas; Brian Loader, ISBN: 0415213266, Oct 2000. [$] Cybershock : Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption, by Winn Schwartau, ISBN 1560252464, 2000. [$] Cyberwar 3.0: Human Factors in Information Operations and Future Conflict, by Alan D. Campen; Douglas H. Dearth, ISBN: 0916159299, Oct 2000. [$] Cyberwars: Espionage on the Internet, by Jean Guisnel; Gui Masai; Winn Schwartau, ISBN: 0738202606, Feb 2000. [$] Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet (with CDROM ), by Eoghan Casey, ISBN: 012162885X, Jan 2000. [$] Electronic Warfare in the Information Age (with Disk), by D. Curtis Schleher, ISBN: 0890065268, Dec 1998. [$] Fighting Computer Crime: A New Framework for Protecting Information, by Donn Parker, ISBN: 0471163783, Aug 1998. [$] The Fugitive Game: Online with Kevin Mitnick, by Jonathan Littman, ISBN: 0316528692, Jan 1997. [$] Hacker Crackdown: Law and Disorder on the Electronic Frontier, by Bruce Sterling, ISBN: 055356370X, Dec 1993. [$] Hackers: Crime in the Digital Sublime, by Paul A. Taylor, ISBN: 0415180724, Sept 1999. [$] Hacking Exposed: Network Security Secrets & Solutions, by Joel Scambray; George Kurtz; Stuart McClure, ISBN: 0072127481, Oct 2000. [$] Handbook of Computer Crime Investigation: Forensic Tools and Technology, by Eoghan Casey, ISBN: 0121631036, July 2001. [$] High-Technology-Crime Investigator's Handbook: Working in the Global Information Environment, by William C. Boni; Gerald L. Kovacich, ISBN: 075067086X, Sept 1999. [$]

Identity Theft: The Cybercrime of the Millennium, by John Q. Newman, ISBN: 1559501952, June 1999. [$] In Athena's Camp: Preparing for Conflict in the Information Age, by John Arquilla; Heidi Toffler; Alvin Toffler, ISBN: 0833025147, Jan 1998. [$] Incident Response: Investigating Computer Crime, by Chris Prosise, ISBN: 0072131829, May 2001. [$] The Information Revolution and National Security: Dimensions and Directions, by Stuart J. D. Schwartzstein, ISBN: 0892062886, Jan 1997. [$] Information Warfare and Security, by Dorothy E. Robling Denning, ISBN: 0201433036, Dec 1998. [$] Information Warfare: Corporate Attack and Defense in a Digital World, by William Hutchinson; Matthew Warren, ISBN: 0750649445, May 2001. [$] Information Warfare: Cyberterrorism--Protecting Your Personal Security in the Electronic Age, by Winn Schwartau, ISBN: 1560251328, Oct 1996. [$] Information Warfare: How to Survive Cyber Attacks, by Michael Erbschloe, ISBN: 0072132604, May 2001. [$] Information Warfare Principles and Operations, by Edward Waltz, ISBN: 089006511X, Sept 1998.[$] Internet and Computer Ethics for Kids And Parents and Teachers Who Haven't Got a Clue, by Winn Schwartau; D. L. Busch, ISBN: 0962870056, Jan 2000. [$] Investigating Computer Crime, by Franklin Clark; Vernon J. Geberth; Ken Diliberto, ISBN: 0849381584, July 1996. [$] Investigating Computer-Related Crime: Handbook for Corporate Investigators, by Peter Stephenson, ISBN: 0849322189, Nov 1999. [$] I-Way Robbery: Crime on the Internet, by William C. Boni; Gerald L. Kovacich; John P. Kenney, ISBN: 0750670290, May 1999. [$] NETSPIONAGE: The Global Threat to Information, by William C. Boni, Gerald L. Kovacich, ISBN: 0750672579, Sept 2000. [$] The Next World War: Computers Are the Weapons and the Front Line is Everywhere, by James Adams, ISBN: 0743223802, Dec 1998. [$] Masters of Deception: The Gang That Ruled Cyberspace, by Michele Slatalla; Joshua Quittner, ISBN: 0060926945, Jan 1996. [$] My Tiny Life: Crime and Passion in the Virtual World, by Julian Dibbell, ISBN: 0805036261, Jan 1999. [$] Organizing for Computer Crime Investigation and Prosecution, by Diane Pub Co, ISBN: 999144775X, Dec 1988. [$] Profile of A Computer Hacker, by Doctor/Major Nicolas Chantler, ISBN 096287000-21. [$] Risky Business: Protect Your Business from Being Stalked, Conned, or Blackmailed on the Web, by Daniel Janal, ISBN: 0471197068, Apr 1998. [$] Secrets and Lies: Digital Security in a Networked World, by Bruce Schneier, ISBN: 0471253111, Oct 2000. [$] Secret Software: Making the Most of Computer Resources for Data Protection, Information Recovery, Forensic Examination, Crime Investigation and More, by Norbert Zaenglein, ISBN: 1581600887, July 2000. [$] Strategic Information Warfare: A New Face of War, by Roger Molander; Peter A. Wilson; Andrew S. Riddile, ISBN: 0833023527, Apr 1996. [$]

Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace, by Richard Power; Rik Farrow, ISBN: 078972443X, Sept 2000. [$] Transnational Criminal Organizations, Cybercrime and Money Laundering A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators, by James R. Richards, ISBN: 0849328063, Oct 1998. [$] The Transnational Dimension of Cybercrime and Terrorism, by Abraham D. Sofaer; Seymour F. Goodman, ISBN: 0817999825, May 2001. [$]

Top Ten Hacker Books This is a list of recommended (non-fiction) books about hackers and hacking which involve real life descriptions of events, and the personalities involved. Although solely my own opinion, I have read most of these titles and stand by this ordering, but of course feel free to post comments of your alternative suggestions here. Enjoy! Ghost in the Wires: My Adventures as the World's Most Wanted Hacker By Kevin Mitnick, Steve Wozniak and William L. Simon Publisher: Little, Brown and Company Published: August 15, 2011 Amazon Link: here

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground By Kevin Poulsen Publisher: Crown Published: February 22, 2011

Amazon Link: here

A true page turning account of the exploits of Max Butler, a.k.a. Max Ray Vision, a notorious hacker who stole access to 1.8 million credit card accounts before law enforcement caught up with him. Kingpin gives us not just the personalities and double-dealing of this new underground, but also a look at how hacking has transformed the world of crime. It details the seesaw life of Butler, at one time a respected computer security professional, and next a pure criminal, hacking into credit card payment systems and handing off millions of credit card numbers to other criminals worldwide, via underground 'carders' websites.

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage By Cliff Stoll Publisher: Gallery Books Published: September 13, 2005. Originally published in 1985. Amazon Link: here

A 75-cent discrepancy in billing for computer time led Stoll, an astrophysicist working as a systems manager at a California laboratory, on a quest that reads with the tension and excitement of a fictional thriller. Painstakingly he tracked down a hacker who was attempting to access American computer networks, in particular those involved with national security, and actually reached into an estimated 30 of the 450 systems he attacked. Initially Stroll waged a lone battle, his employers begrudging him the time spent on his search and several government agencies refused to cooperate. But his diligence paid off and in due course it was learned that the hacker, 25-year-old Markus Hess of Hanover, Germany, was involved with a spy ring. Eight members were arrested by the West German authorities but all but one were eventually released. Although the book will be best appreciated by the computer literate, even illiterates should be able to follow the technical complexities with little difficulty.

The Fugitive Game: Online with Kevin Mitnick By Jonathan Littman Publisher: Little, Brown and Company Published: January 1, 1997 Amazon Link: here

The Fugitive Game is a compelling look at the events that led up to the capture of Kevin Mitnick, and no portion of the folklore surrounding the case is left untouched by the book's critical eye. The real gold of this volume comes from the nearly 200 pages of conversations with Kevin Mitnick himself, most of which were transcribed while he was fleeing from the law. John Markoff's involvement in the eventual capture of Mitnick by Tsutomu Shimomura is also scrutinized at length. A must read companion to "Ghost in the Wires".

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet By Joseph Menn Publisher: PublicAffairs Published: January 26, 2010 Amazon Link: here

Joseph Menn immerses us in the personalities and politics behind today's cybersecurity threats and countermeasures. This balanced, compelling account shows why the future of the Internet depends more on people of good will than on some technological magic bullet. The book describes the efforts of Barrett Lyon, a California surfer self-taught to become one of the world's leading Internet security experts, and Andy Crocker, a courageous British policeman, and their collaborative work to identify the criminals responsible for the now all-too-familiar viruses, worms, Trojans, and denial-of-service attacks that have infiltrated millions of computers and disabled thousands of Web sites.

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers By Kevin Mitnick and William L. Simon Publisher: Wiley Published: December 27, 2005 Amazon Link: here

Mitnick introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaedastyle terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick's handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the storiessome are quite excitingwill impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry.

The Hacker Crackdown: Law And Disorder On The Electronic Frontier By Bruce Sterling Publisher: Bantam Published: November 1, 1993 Amazon Link: here

Bruce Sterling's classic work highlights the 1990 assault on hackers, when law-enforcement officials successfully arrested scores of suspected illicit hackers and other computer-based law-breakers. These raids became symbolic of the debate between fighting serious computer crime and protecting civil liberties. However, The Hacker Crackdown is about far more than a series of police sting operations. It's a lively tour of three cyberspace subcultures--the hacker underworld, the realm of the cybercops, and the idealistic culture of the cybercivil libertarians.

The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen By Jonathan Littman Publisher: Little, Brown and Company Published: March 31, 1997 Amazon Link: here

Takes us inside the mind of former computer hacker and now respected author, Kevin Poulsen. In his previous life as a hacker, he seized the phone lines of a major Los Angeles radio station to make certain he was the 101st caller. Over time, he won two Porsches, $22,000 in cash, and two trips to Hawaii. He was caught and charged with numerous computer and telephone crimes, the most serious of which alleged that he obtained a classified document from a military database. Poulsen became the first computer hacker in history to be charged with espionage, and in all he was charged with 19 counts of computer fraud, wiretapping, money laundering, and obstruction of justice.

Masters of Deception: The Gang That Ruled Cyberspace By Michele Slatalla Publisher: Harper Perennial Published: December 1, 1995 Amazon Link: here

A riveting account of electronic gang warfare and computer crimes by two rival bands of hackers. One group of brainy teens based in New York City and calling themselves Masters of Deception (MOD) downloaded confidential credit histories (including those of Geraldo Rivera and Julia Roberts), broke into AT&T's computer system and stole creditcard numbers. Their arch rivals, the Texas-based Legion of Doom (LOD), launched a security service firm to assist corporations whose computers MOD has penetrated. The events leading up to the conflict and its climax make for some great reading.

Unmasked By Peter Bright, Nate Anderson, Jacqui Cheng, Eric Bangeman and Aurich Lawson (of ArsTechnica)

Publisher: Amazon Digital Services (Kindle Edition) Published: March, 2011 Amazon Link: here

ArsTechnica does a fantastic job of chronicling the Anonymous/HBGary saga over the course of a number of articles. Every piece is well written, detailed, and informative. If you have any interest in the impact an anonymous collection of individuals can have, or the types of organizations the US government contracts with, you owe it to yourself to read this book.

Below I've listed some books that I feel deserve a mention, including the recently released titles "DarkMarket" by Misha Glenny and "A Bug Hunter's Diary" by Tobias Klein.

> DarkMarket: Cyberthieves, Cybercops and You By Misha Glenny Publisher: Knopf Published: October 4, 2011 Amazon Link: here

Misha Glenny (author of organised crime book "McMafia"), explores the three fundamental threats facing us in the twenty-first century: cybercrime, cyberwarfare and cyberindustrial espionage. Glenny travelled from the U.S. to Ukraine, via France, Germany and Turkey following the players associated with cybercrime, including those associated with the underground carders website DarkMarket. Interviews feature the criminals, the geeks, the police, the security experts and the victims.

> CYBERPUNK: Outlaws and Hackers on the Computer Frontier, Revised Edition By Katie Hafner Publisher: Simon & Schuster Published: November 1, 1995 Amazon Link: here

Cyberpunk tells the stories of notorious hackers Kevin Mitnick, Robert T. Morris, and the Berlin-based Chaos Computer Club. The story of Morris, who became infamous for unleashing a crippling worm that brought the Internet to a grinding standstill, is still as relevant and ominous today as it was at the time. The space devoted to Mitnick is a must-

read companion to either "Ghost in the Wires" or "The Fugitive Game". Included also is CCC's "Pengo and the Project Equalizer," the story of a West Berlin punk turned hacker, a true cyberpunk of the title.

> A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security By Tobias Klein Publisher: No Starch Press Published: October 22, 2011 Amazon Link: here

Follow along with security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring over disassembly, or fuzzing live programs, readers get an over-the-shoulder glimpse into the world of a bug hunter as Klein unearths security flaws and uses them to take control of affected systems. They also learn how the developers responsible for these flaws responded to Klein's discoveriesor didn't seem to respond at all. In this one-of-a-kind guide that mixes the personal with the deeply technical, readers learn how hackers approach difficult problems, see the fallout of a security advisory, and understand the true joys (and frustrations) of bug hunting.

> Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier By Suelette Dreyfus Publisher: Mandarin Australia Published: June 6, 1997 Amazon Link: here

Underground provides an excellent overview of intrusion activities focusing on the UK, Australia, and the United States from the late 80's to the early 90's, with stories on incidents such as the WANK Worm outbreak and 8lgm's activities. The stand out attribute of this book is that it examines what happened to the intruders after their activity rather than focusing on the activity itself. WikiLeaks founder, Julian Assange, famously helped with research for this book.

Das könnte Ihnen auch gefallen